See what your peers are doing:

Leidos Cyber:

SOC Transformation Services

Evolve security operations through intelligence.

Cyber threats and cyber budgets are on the rise. Security and risk professionals are looking to make strategic decisions to protect the enterprise and deliver results. Partner with us to build, transform, integrate and run your security operations with intelligence.

Our team of advanced cyber analysts will work with your team to align your people, technology and processes to transform your monitored security operations center into advanced security intelligence center (SIC).

Engagement Models:

Choose the level of engagement that best complements your needs;

consulting as you execute

staff augmentation and analyst immersion working under your direction

complete turnkey delivery of SOC logical design, staffing and process development and management of daily operations under your oversight

Service Components Include:

Assessment of SOC processes and procedures

Development of strategic vision road map designed to evolve people, technologies and processes

Consulting and/or execution support of transformation phases

Create physical and logical design

Define team roles and responsibilities

Fulfill Staffing, training, and process development

Support policy and documentation creation

Deploy and integrate technology

Support operations and sustainment management

Transfer knowledge to client analysts throughout the transformation and adoption process

Manage transition of SOC operations to client analysts for self-sustainment

Service Benefits

Increase efficiency through technology integration and automation. Starting with an assessment of your current technology, we look to automate where possible, tune alerting, and fill identified gaps.

Quickly identify and leverage actionable intelligence: The right technology and trained staff enable better synthesis and prioritization of the daily barrage of intelligence from multiple external and internal sources.

A large security enterprise increased their incident detection and response capabilities 10x within months of implementing effective recommendations.

See what your peers are doing.

How it works:

Three steps in the transformation journey

Assess

Using a four point scale we assess your organization across fifteen domains to baseline your cybersecurity posture and inform a go-forward strategy.

Plan

A strategic vision road map defines well-documented tactics and sequences client priorities for SOC operations so you’ll know what to do and when to do it.

Cybersecurity Maturity for Unified Enterprise Defense

Emerging Security Capabilities – The enterprise has started to build out capabilities for foundational areas of security aligned to risk. Operations are in a distributed manner, and a standardized model and consistent approach has not been defined or focused on network defense functions.

Defined Security Operations – The enterprise has a baseline of repeatable security operations and may have a dedicated team for network defense. Workloads are primarily reactive cyber response activities, preventing effective defensive operations. Threat intelligence may be leveraged in an ad-hoc capacity.

Integrated Defensive Operations – The enterprise has aligned both aspects of securing the enterprise and defending the enterprise into a well-defined industry model. Threat intelligence is integral to daily operations and feeds detective and defensive strategies.

Adaptive Intelligence Operations – The enterprise has established a mature cyber defense program. Operations continue to mature and adapt through automation efficiencies and partnerships as the threat landscape changes. Custom capabilities are established and threat intelligence managed to the degree that historical data trending enables the security organization to stay ahead of adversaries.